Homeland Had it Right!

Brian Wood Blog

Just in case you were wondering (like me)… Article by Carol Ko in DOTmed. Emphasis in red added by me. Brian Wood, VP Marketing ——– Yes, Cheney’s pacemaker cyber attack fears were credible Former vice president Dick Cheney made headlines this week after admitting in a 60 Minutes interview that he disabled his pacemaker’s Wi-Fi in 2007 to thwart terrorists …

iFair iTrade? iConvenience vs. iSecurity with iCloud

Brian Wood Blog

In the spirit of “let’s make things better, together” I re-post the article below by Chester Wisniewski in Naked Security. As indicated in other blog and whitepaper offerings we’ve put forth, it’s important to note that having SOME level of security can, unfortunately, be misinterpreted as having a SUFFICIENT level of security. Think thrice before assuming your information is secure. …

Back to Basics: Fundamentals of CyberSecurity

Brian Wood Blog

Simple yet effective commentary. Periodically we all need reminders about the fundamentals of what’s important– about cybersecurity, about business and customer satisfaction, and about life lived to its full potential. And as sophisticated as our modern world may be, it’s often the most basic things that fall into our blind spots — things we take for granted or discount due …

Fat Stacks: $500B Stolen from US Companies — Every Year

Brian Wood Blog

Think cyber-espionage is a victimless crime? Think again. And think how quickly the US competitiveness gap (i.e., our advantage) will shrink if the current rate of intellectual property theft continues apace. CyberSecurity: it’s not just for breakfast anymore. Learn it, do it, preach it. Article by Joshua Philipp in Epoch Times. Emphasis in red added by me. Brian Wood, VP …

Stick ‘Em Up! Cloud Security Held to High(er) Standards

Brian Wood Blog

Do as I say, not as I do. Or so reluctant IT managers would have cloud providers believe as they are held to higher standards than what those IT managers currently deliver themselves. While the risks associated with outsourcing ANYTHING to another party are indeed real, I submit that they are just as real as doing those things internally — …

Prepare! The End Is Near

Brian Wood Blog

Repetition works — and so the cybersecurity warning messages are starting to soak in. Prepare for “when”, not “if” — for ignorance is no longer an excuse. By John Ginovsky in ABA Banking Journal. Emphasis in red added by me. Brian Wood, VP Marketing ———- Bank survey finds many tech companies preparing for cyber attacks Silicon Valley Bank clients prepare …

54% of Cyber Attacks in Energy Sector

Brian Wood Blog

Mirror, mirror, on the wall, who’s the juiciest target of them all? Evidently it’s the energy sector, which faced 54% of all incidents investigated by the DHS Cyber Emergency Response Team in an 8-month period between Oct 2012 and May 2013. The article below was published in Canadian Underwriter — one of my very favorite online Canadian insurance and risk …

NIST Updates CyberSecurity Framework

Brian Wood Blog

By virtue of our membership in CyberHive (shout-out to Darin Andersen), AIS participated in the NIST cybersecurity workshop that took place in San Diego in mid-July. Through that event and a few other workshops, NIST has developed an updated cybersecurity framework for critical infrastructure as mandated by the February cybersecurity executive order. The article below — by Cynthia Brumfield in …

CyberTini, October 2 in San Diego

Brian Wood Past Events

October 2, 2013 | SDG&E Innovation Center 4760 Clairemont Mesa Blvd San Diego, CA 92117 3:15 to 9:00 PM Securing the Internet of Things The Internet of Things (IOT) is the term for the phenomenon where people and things (physical devices such vehicles, commercial and industrial equipment, medical devices, remote sensors, etc.) are connected to networks that are linked to …

CyberSecurity Webinar & Whitepaper

Brian Wood Blog, Past Events

CyberSecurity: In-House vs. Managed Services AIS commissioned Matthew McCormack — one of the most noteworthy, experienced cybersecurity experts on the planet — to write a whitepaper and deliver a webinar on what YOU can do to protect your business. During this webinar Mr. McCormack describes the “what, why, and how” of looking at in-house vs. managed service providers for cybersecurity. …